The changing, converging nature of threats faced today — especially those from terrorism, transnational crime and the use of technology to carry out criminal behavior — make it imperative that intelligence-led policing be integrated into the decentralized police structures and community policing principles of the United States.

The report lists a hierarchy of threats that include an overall "evolutionary shift" toward "a blended terror threat that unites foreign directed or inspired attacks with homegrown elements and operators."

This policy paper forms the new narrative that could justify the continuing infiltration and crackdown upon peaceful protest, civil disobedience, and even the questioning of American foreign policy and Homeland Security directives, whether on the street or in cyberspace.

The report opens with quotes from the two most ideologically repressive representatives of the Homeland Security initiative: John Ashcroft and Janet Napolitano. Both of their quotes speak to coordinating federal and local efforts in the "war on terror," which HSPI interpreted as "accepted wisdom that weaving together of national efforts at the local, state, and federal levels is critical to US counterterrorism."

The preface to the report suggests that the current status of intelligence gathering and local police work is in vast disarray, "there is a consensus that . . . intelligence capabilities are lacking, collection is haphazard, resources are underutilized, and the U.S. has a limited ability to develop anticipatory knowledge concerning future attacks, mitigate risks, or respond to emerging threats."

This statement is meant to obfuscate the fact that a vast counterintelligence apparatus has been in place for some time, which includes, but is not limited to:

From this faulty assessment of how taxpayer money has already been spent to create a massive prison system for both body and mind, the report presents its foundational findings via surveys that indicate the merging of terrorists foreign and domestic. This hierarchy reads as follows, and is supported by graphs and charts that indicate the responses from "intelligence unit commanders of the US' major metropolitan areas (who) continue to perceive terrorism as a real threat to the safety of their communities."

This hierarchy of perceived threats is then merged into an overall assessment of capabilities and intentions, which reveals that the twin concerns are first to "Spread Narrative" and second "Fundraising / Money Laundering." Here we can begin to see the future direction of Homeland Security counterterrorism operations: banking and the Internet.

This conclusion is supported by the rest of the document which cites the need for centralization, precisely because the "enemy" is decentralized:

Most likely AQAP due to their decentralized outreach capabilities and ability to recruit via social media campaigns (i.e. Inspire.)

Furthermore, the base of operations apparently has shifted from the sands of the Middle East to "using the United States as an environment for building support and raising recruits."

Strangely, the report goes on to refute the idea that the overall system is in disarray by citing evidence that there is already cohesion in information sharing regarding the threat landscape. Respondents overwhelmingly reported that they "Often" send and receive information to and from their local fusion center, while a majority indicated that they currently participate in the "reporting, tracking, and accessing" of the nationwide suspicious activity reporting initiative (NSI) which is nothing more than a catalog of citizen spy information fed predominantly from the private sector to law enforcement and upward to Homeland Security. Sharing is further solidified online through participation in the eGuardian system.

These local respondents also seem dangerously (or curiously) eager to sacrifice their autonomy, as they "placed greater importance on the information provided by federal authorities." Despite a cursory concern for privacy protection "the vast majority of respondents indicated that their departments would be willing to go beyond the sharing of information and share the sources from which the information originates (including confidential informants)." In short, whatever it takes, and by all means necessary.

Finally, it is clear that local law enforcement is comfortable with the new hierarchy dictated to them by the Federal apparatus. When asked to cite how they go about their intelligence gathering they "indicated that they turn primarily to federal officials or agencies for guidance" such as the FBI -- most often cited -- with DHS, the CIA, and military intelligence rounding out the agencies our local police wish to emulate in "structures and efforts."

In so doing, local police are seeking the currently unnamed intelligence "products" of such information-gathering efforts, which will be the subject of future inquiry.

And what was the #1 source listed for the gathering and sharing of this information? Information from citizens -- not federal agencies. The reason for this conclusion is cited at the end of the report which acknowledges a "time of increasing austerity" that implies might hamper the development and implementation of surveillance and data collection technology. But the citizens of a country remain a resource easily tapped. We should keep this firmly in mind as we look outward for signs of oppression. Are we willing to take equal responsibility for what America currently has become, and for the direction it is headed? We have been slated as "practioners" in the role of national security, and as the report's final statement makes clear:

How practitioners conceptualize and perceive of the threat is of vital importance, their perceptions affect which threats are detected and when. Furthermore, their perceptions represent an empirical guide for targeting the tools needed to develop anticipatory intelligence. Whether, and how well this is done depends on the perceptions of the practitioners themselves...

We encourage you to read the full 22-page PDF, which seems to provide the justification for the next phase of the control grid which will affect every American throughout the real and virtual landscape. Please comment below with your analysis and conclusions, as well as ideas for preserving our liberty during a time of heightened suspicion and paranoia that is now clearly re-directing its efforts onto American soil as the 10th anniversary of 9/11 approaches.

6 comments:

The only evolution of this shit I see is by next month Janet the Molester is going to force all travellers to wear a rhinestone choke collar and nipple rings. The creep still does not know who did 9-11. and if she does, she won't tell the American people, making her nothing beyond sick meat. Sick meat with a gun.

our "congress" is responsible for this entire mess...and if we don't turn them out and install HONEST AS WELL AS BRAVE people at ALL levels of government...and VERY SOON, we may as well bend wayyy over and kiss our ass goodbye!! Homeland Security is not about "protecting" this country...it's all about protecting those who wish to completely destroy this country!!

HmmmWhats that old say about finding out who that true enemy of the people is.....the state itself. The reason for the continued push for centralized control is because centralized control equals centralized power. Centralized power means a few can effectively control the many. History is littered with once great empires that evolved into dictatorships precisely because centralized control means no checks and balances to stop the total corruption that always occurs. Our republic has clearly traveled a long way down that road to dictatorship. "homeland" security a term straight out of Nazi Germany people.

9/11 Questions

Activist Post is an Independent News blog for Activists challenging the abuses of the establishment.

FAIR USE NOTICE. Many of the stories on this site contain copyrighted material whose use has not been specifically authorized by the copyright owner. We are making this material available in an effort to advance the understanding of environmental issues, human rights, economic and political democracy, and issues of social justice. We believe this constitutes a 'fair use' of the copyrighted material as provided for in Section 107 of the US Copyright Law which contains a list of the various purposes for which the reproduction of a particular work may be considered fair, such as criticism, comment, news reporting, teaching, scholarship, and research. If you wish to use such copyrighted material for purposes of your own that go beyond 'fair use'...you must obtain permission from the copyright owner.

Paid advertising on Activist Post may not represent the views and opinions of this website and its contributors. No endorsement of products and services advertised is either expressed or implied.

All opinions expressed by contributors to this site are theirs and theirs alone.